18.4 C
London
Monday, August 21, 2017
Home Tags Transport Layer Security (TLS)

Tag: Transport Layer Security (TLS)

Seven years after acquiring the SSL/TLS certificate business from VeriSign, Symantec sells the business unit to DigiCert.
It's got an end-of-life date, though: next Tuesday An e-mail has gone out from IBM about its Bluemix cloud: after next Tuesday, the SoftLayer APIs will no longer accept connections encrypted with the ancient TLS 1.0.…
Google's browser will start the process of removing trust from old Symantec TLS certificates in Chrome 66.
The new solution is aimed at enterprise players which need a way to manage SSL/TLS certificates.
Substandard certs, already in partial exile, soon to be shunned completely Google in two months will conclude its prolonged excommunication of misbehaving SSL/TLS certificate authorities WoSign and subsidiary StartCom, a punishment announced last October.…
HPE's SiteScope is vulnerable to several cryptographic issues,insufficiently protected credentials,and missing authentication.
'Inner authentication' has bad karma, allows strangers to log in without credentials Sysadmins with FreeRADIUS – the most widely deployed Remote Authentication Dial-In User Service server – in their boxen need to run an upgrade because there's a bug in its TTLS and PEAP implementations.…
'Inner authentication' has bad karma, allows strangers to log in without credentials Sysadmins with FreeRADIUS in their boxen need to run in an upgrade, because there's a bug in its TTLS and PEAP implementations.…
SPARTAN Cloud is the first security product that enables secure connections to AWS, Azure and Google Cloud based on Transport Layer Security (TLS).
The Tuesday updates for Internet Explorer and Microsoft Edge force those browsers to flag SSL/TLS certificates signed with the aging SHA-1 hashing function as insecure.

The move follows similar actions by Google Chrome and Mozilla Firefox earlier this year.Browser vendors and certificate authorities have been engaged in a coordinated effort to phase out the use of SHA-1 certificates on the web for the past few years, because the hashing function no longer provides sufficient security against spoofing.[ Safeguard your data! The tools you need to encrypt your communications and web data. • Maximum-security essential tools for everyday encryption. • InfoWorld's encryption Deep Dive how-to report. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ]SHA-1 (Secure Hash Algorithm 1) dates back to 1995 and has been known to be vulnerable to theoretical attacks since 2005.

The U.S. National Institute of Standards and Technology has banned the use of SHA-1 by U.S. federal agencies since 2010, and digital certificate authorities have not been allowed to issue SHA-1-signed certificates since Jan. 1, 2016, although some exemptions have been made -- for example, for outdated payment terminals.To read this article in full or to leave a comment, please click here
TLS certificate vendor says it will even audit its previous audits to prevent having Google reduce its trust on Symantec certificates.
In a few months, publicly trusted certificate authorities will have to start honoring a special Domain Name System (DNS) record that allows domain owners to specify who is allowed to issue SSL certificates for their domains.The Certification Authority Authorization (CAA) DNS record became a standard in 2013 but didn't have much of a real-world impact because certificate authorities (CAs) were under no obligation to conform to them.[ Expand your security career horizons with these essential certifications for smart security pros. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ]The record allows a domain owner to list the CAs that are allowed to issue SSL/TLS certificates for that domain.

The reason for this is to limit cases of unauthorized certificate issuance, which can be accidental or intentional, if a CA is compromised or has a rogue employee.To read this article in full or to leave a comment, please click here